Recs.
Updated
Keystash aims to significantly improve your Linux IT security posture by managing SSH Keys, SSH policy and SSH Two Factor Authentication. Keystash gives you visibility of who has access to what and who they got that access from.
Keystash secures and protects your entire organisations SSH connections by managing user and machine SSH Keys, SSH security policies and settings and by implementing SSH Two Factor Authentication. Keystash ensures that all actions and connections are auditable and visible ensuring governance of who connected to what and when.
Securing SSH systems can be complex, especially when you include end user SSH Key generation into the equation. Keystash is designed from the ground up to be not only secure but to be user friendly and fast to get going.
Typically, setup and installation across your infrastructure is less than an hour depending on the size and complexity of your environment.